PT-2025-53686 · Smartertools · Smartermail
Chua Meng Han
·
Published
2025-12-29
·
Updated
2026-01-12
·
CVE-2025-52691
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
SmarterMail versions prior to Build 9413
SmarterMail version 9406
SmarterMail versions prior to Build 9406
SmarterMail versions prior to October 9, 2025
Description
A critical vulnerability exists in SmarterMail that allows unauthenticated attackers to upload arbitrary files to any location on the mail server. Successful exploitation could lead to remote code execution (RCE), potentially enabling full server compromise, data theft, ransomware deployment, and lateral movement within a network. The vulnerability, tracked as CVE-2025-52691, has a CVSS score of 10.0, indicating maximum severity. A public proof-of-concept (PoC) exploit has been released, increasing the risk of exploitation. The
/api/upload endpoint is vulnerable, with the guid parameter within contextData susceptible to a path traversal attack. Approximately 101,000 instances of SmarterMail are exposed. The Singapore Cyber Security Agency (CSA) has issued an alert regarding this vulnerability.Recommendations
Upgrade SmarterMail to Build 9413 or later immediately.
Upgrade SmarterMail to Build 9483.
For versions prior to Build 9413, upgrade to the latest available version.
For versions prior to October 9, 2025, upgrade to Build 9413 or later.
Exploit
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-52691
Affected Products
Smartermail
References · 89
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691?ref=labs.watchtowr.com⭐ 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-52691 · Security Note
- https://twitter.com/TechNadu/status/2006383842001813684 · Twitter Post
- https://twitter.com/ThreatSynop/status/2006136374814994703 · Twitter Post
- https://twitter.com/Cyberwarzonecom/status/2007593078509494647 · Twitter Post
- https://twitter.com/redsecuretech/status/2006309199119302972 · Twitter Post
- https://csa.gov.sg/alerts-and-advisories/alerts/al-2025-124 · Note
- https://twitter.com/7h3h4ckv157/status/2006146093130613114 · Twitter Post
- https://t.me/thebugbountyhunter/10480 · Telegram Post
- https://twitter.com/_r_netsec/status/2009335068951794012 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1q7knsy/secopsdaily_20260108_roundup · Reddit Post
- https://twitter.com/Guardian360nl/status/2008109998090408374 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1q11rdj/top_10_trending_cves_01012026 · Reddit Post
- https://twitter.com/TomCao341/status/2006175850262323284 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1pzndvf/critical_smartermail_bug_exposes_users_to_remote · Reddit Post